{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:48:22Z","timestamp":1740098902913,"version":"3.37.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319600796"},{"type":"electronic","value":"9783319600802"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60080-2_17","type":"book-chapter","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T14:40:06Z","timestamp":1496328006000},"page":"215-233","source":"Crossref","is-referenced-by-count":6,"title":["A Supervised Auto-Tuning Approach for a Banking Fraud Detection System"],"prefix":"10.1007","author":[{"given":"Michele","family":"Carminati","sequence":"first","affiliation":[]},{"given":"Luca","family":"Valentini","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Zanero","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,2]]},"reference":[{"key":"17_CR1","unstructured":"Kaspersky Security Bulletin 2016. Technical report, Kaspersky Lab (2017). https:\/\/goo.gl\/Jzkab2"},{"key":"17_CR2","unstructured":"Almuallim, H., Dietterich, T.G.: Learning with many irrelevant features. In: AAAI, vol. 91, pp. 547\u2013552. Citeseer (1991)"},{"key":"17_CR3","unstructured":"Amer, M., Goldstein, M.: Nearest-neighbor and clustering based anomaly detection algorithms for RapidMiner. In: Proceedings of the 3rd RapidMiner Community Meeting and Conference (RCOMM 2012), pp. 1\u201312 (2012)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Bolton, R.J., Hand, D.J.: Statistical fraud detection: a review. Stat. Sci. 17 (2002)","DOI":"10.1214\/ss\/1042727940"},{"key":"17_CR5","unstructured":"Bolton, R.J., Hand, D.J., David J.H.: Unsupervised profiling methods for fraud detection. In: Proceedings of Credit Scoring and Credit Control VII, pp. 5\u20137 (2001)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Cardie, C.: Using decision trees to improve case-based learning. In: Proceedings of the Tenth International Conference on Machine Learning, pp. 25\u201332 (1993)","DOI":"10.1016\/B978-1-55860-307-3.50010-1"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Carminati, M., Caron, R., Maggi, F., Epifani, I., Zanero, S.: BankSealer: an online banking fraud analysis and decision support system. In: ICT Systems Security and Privacy Protection. IFIP Advances in Information and Communication Technology, vol. 428, pp. 380\u2013394. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-642-55415-5_32"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Carminati, M., Caron, R., Maggi, F., Epifani, I., Zanero, S.: BankSealer: a decision support system for online banking fraud analysis and investigation. Comput. Secur. 53, 175\u2013186 (2015) http:\/\/dx.doi.org\/10.1016\/j.cose.2015.04.002","DOI":"10.1016\/j.cose.2015.04.002"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 15:1\u201315:58 (2009)","DOI":"10.1145\/1541880.1541882"},{"issue":"1","key":"17_CR10","first-page":"57","volume":"10","author":"S Cost","year":"1993","unstructured":"Cost, S., Salzberg, S.: A weighted nearest neighbor algorithm for learning with symbolic features. Mach. Learn. 10(1), 57\u201378 (1993)","journal-title":"Mach. Learn."},{"issue":"3","key":"17_CR11","first-page":"1","volume":"9","author":"K Deb","year":"1994","unstructured":"Deb, K., Agrawal, R.B.: Simulated binary crossover for continuous search space. Complex Syst. 9(3), 1\u201315 (1994)","journal-title":"Complex Syst."},{"issue":"2","key":"17_CR12","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182\u2013197 (2002)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Eiben, A.E., Smith, J.E.: Introduction to Evolutionary Computing. Springer Science & Business Media, New York (2003)","DOI":"10.1007\/978-3-662-05094-1"},{"key":"17_CR14","unstructured":"Goldstein, M., Dengel, A.: Histogram-Based Outlier Score (HBOS): a fast unsupervised anomaly detection algorithm. In: KI-2012: Poster and Demo Track, pp. 59\u201363 (2012)"},{"key":"17_CR15","series-title":"The Morgan Kaufmann Series in Data Management Systems Series","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2006","unstructured":"Han, J., Kamber, M.: Data Mining: Concepts and Techniques. The Morgan Kaufmann Series in Data Management Systems Series. Elsevier Science & Tech, Amsterdam (2006)"},{"issue":"1","key":"17_CR16","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1186\/1471-2105-6-148","volume":"6","author":"T Jirapech-Umpai","year":"2005","unstructured":"Jirapech-Umpai, T., Aitken, S.: Feature selection and classification for microarray data analysis: evolutionary methods for identifying predictive genes. BMC Bioinform. 6(1), 148 (2005)","journal-title":"BMC Bioinform."},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Kira, K., Rendell, L.A.: A practical approach to feature selection. In: Proceedings of the Ninth International Workshop on Machine Learning, pp. 249\u2013256 (1992)","DOI":"10.1016\/B978-1-55860-247-2.50037-1"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Kohavi, R., John, G.H.: Automatic parameter selection by minimizing estimated error. In: ICML, pp. 304\u2013312. Citeseer (1995)","DOI":"10.1016\/B978-1-55860-377-6.50045-1"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Kohavi, R., John, G.H.: The wrapper approach. In: Feature Extraction, Construction and Selection, pp. 33\u201350. Springer (1998)","DOI":"10.1007\/978-1-4615-5725-8_3"},{"key":"17_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/3-540-57868-4_57","volume-title":"Machine Learning: ECML-94","author":"I Kononenko","year":"1994","unstructured":"Kononenko, I.: Estimating attributes: analysis and extensions of RELIEF. In: Bergadano, F., Raedt, L. (eds.) ECML 1994. LNCS, vol. 784, pp. 171\u2013182. Springer, Heidelberg (1994). doi: 10.1007\/3-540-57868-4_57"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Langley, P., Sage, S.: Induction of selective Bayesian classifiers. In: Proceedings of the Tenth International Conference on Uncertainty in Artificial Intelligence, pp. 399\u2013406. Morgan Kaufmann Publishers Inc. (1994)","DOI":"10.1016\/B978-1-55860-332-5.50055-9"},{"key":"17_CR22","unstructured":"Mahalanobis, P.C.: On the generalized distance in statistics. In: Proceedings of the National Institute of Science of India, vol. 2, pp. 49\u201355 (1936)"},{"issue":"3","key":"17_CR23","first-page":"193","volume":"9","author":"BL Miller","year":"1995","unstructured":"Miller, B.L., Goldberg, D.E.: Genetic algorithms, tournament selection, and the effects of noise. Complex Syst. 9(3), 193\u2013212 (1995)","journal-title":"Complex Syst."},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Mitchell, M.: An Introduction to Genetic Algorithms. MIT Press, Cambridge (1998)","DOI":"10.7551\/mitpress\/3927.001.0001"},{"key":"17_CR25","unstructured":"Mitchell, T.: Machine Learning. McGraw Hill, New York (1997)"},{"issue":"3","key":"17_CR26","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1109\/34.990133","volume":"24","author":"P Mitra","year":"2002","unstructured":"Mitra, P., Murthy, C., Pal, S.K.: Unsupervised feature selection using feature similarity. IEEE Trans. Pattern Anal. Mach. Intell. 24(3), 301\u2013312 (2002)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"17_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/BFb0056869","volume-title":"Parallel Problem Solving from Nature \u2014 PPSN V","author":"S Obayashi","year":"1998","unstructured":"Obayashi, S., Takahashi, S., Takeguchi, Y.: Niching and elitist models for MOGAs. In: Eiben, A.E., B\u00e4ck, T., Schoenauer, M., Schwefel, H.-P. (eds.) PPSN 1998. LNCS, vol. 1498, pp. 260\u2013269. Springer, Heidelberg (1998). doi: 10.1007\/BFb0056869"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Oliveira, L.S., Sabourin, R., Bortolozzi, F., Suen, C.Y.: Feature selection using multi-objective genetic algorithms for handwritten digit recognition. In: Proceedings of 16th International Conference on Pattern Recognition, vol. 1, pp. 568\u2013571. IEEE (2002)","DOI":"10.1109\/ICPR.2002.1044794"},{"key":"17_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/BFb0056868","volume-title":"Parallel Problem Solving from Nature \u2014 PPSN V","author":"GT Parks","year":"1998","unstructured":"Parks, G.T., Miller, I.: Selective breeding in a multiobjective genetic algorithm. In: Eiben, A.E., B\u00e4ck, T., Schoenauer, M., Schwefel, H.-P. (eds.) PPSN 1998. LNCS, vol. 1498, pp. 250\u2013259. Springer, Heidelberg (1998). doi: 10.1007\/BFb0056868"},{"key":"17_CR30","doi-asserted-by":"crossref","unstructured":"Parzen, E.: On estimation of a probability density function and mode. Ann. Math. Stat. 33(3), 1065\u20131076 (1962)","DOI":"10.1214\/aoms\/1177704472"},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Phua, C., Alahakoon, D., Lee, V.: Minority report in fraud detection: classification of skewed data. SIGKDD Explor. Newsl. 6(1), 50\u201359 (2004)","DOI":"10.1145\/1007730.1007738"},{"key":"17_CR32","doi-asserted-by":"crossref","unstructured":"Phuong, T.M., Lin, Z., Altman, R.B.: Choosing SNPs using feature selection. In: Proceedings of Computational Systems Bioinformatics Conference, 2005, pp. 301\u2013309. IEEE (2005)","DOI":"10.1109\/CSB.2005.22"},{"key":"17_CR33","unstructured":"Punch III, W.F., Goodman, E.D., Pei, M., Chia-Shun, L., Hovland, P.D., Enbody, R.J.: Further research on feature selection and classification using genetic algorithms. In: ICGA, pp. 557\u2013564 (1993)"},{"key":"17_CR34","unstructured":"Rudolph, G.: Evolutionary search under partially ordered sets. Dept. Comput. Sci.\/LS11, Univ. Dortmund, Dortmund, Germany, Technical report CI-67\/99 (1999)"},{"issue":"6","key":"17_CR35","doi-asserted-by":"crossref","first-page":"1232","DOI":"10.1016\/j.compeleceng.2011.01.010","volume":"37","author":"H Soyel","year":"2011","unstructured":"Soyel, H., Tekguc, U., Demirel, H.: Application of NSGA-II to feature selection for facial expression recognition. Comput. Electr. Eng. 37(6), 1232\u20131240 (2011)","journal-title":"Comput. Electr. Eng."},{"key":"17_CR36","doi-asserted-by":"crossref","unstructured":"Wei, W., Li, J., Cao, L., Ou, Y., Chen, J.: Effective detection of sophisticated online banking fraud on extremely imbalanced data. World Wide Web 16(4), 449\u2013475 (2013). http:\/\/dx.doi.org\/10.1007\/s11280-012-0178-0","DOI":"10.1007\/s11280-012-0178-0"},{"issue":"1\u20135","key":"17_CR37","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1023\/A:1006593614256","volume":"11","author":"D Wettschereck","year":"1997","unstructured":"Wettschereck, D., Aha, D.W., Mohri, T.: A review and empirical evaluation of feature weighting methods for a class of lazy learning algorithms. Artif. Intell. Rev. 11(1\u20135), 273\u2013314 (1997)","journal-title":"Artif. Intell. Rev."},{"key":"17_CR38","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/978-1-4615-5725-8_8","volume-title":"Feature Extraction, Construction and Selection","author":"J Yang","year":"1998","unstructured":"Yang, J., Honavar, V.: Feature subset selection using a genetic algorithm. In: Liu, H., Motoda, H. (eds.) Feature Extraction, Construction and Selection, pp. 117\u2013136. Springer, New York (1998)"},{"issue":"2","key":"17_CR39","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1162\/106365600568202","volume":"8","author":"E Zitzler","year":"2000","unstructured":"Zitzler, E., Deb, K., Thiele, L.: Comparison of multiobjective evolutionary algorithms: empirical results. Evol. Comput. 8(2), 173\u2013195 (2000)","journal-title":"Evol. Comput."}],"container-title":["Lecture Notes in Computer Science","Cyber Security Cryptography and Machine Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60080-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,9]],"date-time":"2020-10-09T05:58:44Z","timestamp":1602223124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60080-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600796","9783319600802"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60080-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}